ID

VAR-202212-1523


CVE

CVE-2022-42852


TITLE

Vulnerabilities in multiple Apple products

Trust: 0.8

sources: JVNDB: JVNDB-2022-023611

DESCRIPTION

The issue was addressed with improved memory handling. This issue is fixed in Safari 16.2, tvOS 16.2, macOS Ventura 13.1, iOS 15.7.2 and iPadOS 15.7.2, iOS 16.2 and iPadOS 16.2, watchOS 9.2. Processing maliciously crafted web content may result in the disclosure of process memory. Safari , iPadOS , iOS Unspecified vulnerabilities exist in multiple Apple products.Information may be obtained. For the stable distribution (bullseye), these problems have been fixed in version 2.38.3-1~deb11u1. We recommend that you upgrade your webkit2gtk packages. Safari 16.2 may be obtained from the Mac App Store. Alternatively, on your watch, select "My Watch > General > About". -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 APPLE-SA-2022-12-13-7 tvOS 16.2 tvOS 16.2 addresses the following issues. Information about the security content is also available at https://support.apple.com/HT213535. Accounts Available for: Apple TV 4K, Apple TV 4K (2nd generation and later), and Apple TV HD Impact: A user may be able to view sensitive user information Description: This issue was addressed with improved data protection. CVE-2022-42843: Mickey Jin (@patch1t) AppleAVD Available for: Apple TV 4K, Apple TV 4K (2nd generation and later), and Apple TV HD Impact: Parsing a maliciously crafted video file may lead to kernel code execution Description: An out-of-bounds write issue was addressed with improved input validation. CVE-2022-46694: Andrey Labunets and Nikita Tarakanov AppleMobileFileIntegrity Available for: Apple TV 4K, Apple TV 4K (2nd generation and later), and Apple TV HD Impact: An app may be able to bypass Privacy preferences Description: This issue was addressed by enabling hardened runtime. CVE-2022-42865: Wojciech Reguła (@_r3ggi) of SecuRing AVEVideoEncoder Available for: Apple TV 4K, Apple TV 4K (2nd generation and later), and Apple TV HD Impact: An app may be able to execute arbitrary code with kernel privileges Description: A logic issue was addressed with improved checks. CVE-2022-42848: ABC Research s.r.o ImageIO Available for: Apple TV 4K, Apple TV 4K (2nd generation and later), and Apple TV HD Impact: Processing a maliciously crafted file may lead to arbitrary code execution Description: An out-of-bounds write issue was addressed with improved input validation. CVE-2022-46693: Mickey Jin (@patch1t) ImageIO Available for: Apple TV 4K, Apple TV 4K (2nd generation and later), and Apple TV HD Impact: Parsing a maliciously crafted TIFF file may lead to disclosure of user information Description: The issue was addressed with improved memory handling. CVE-2022-42851: Mickey Jin (@patch1t) IOHIDFamily Available for: Apple TV 4K, Apple TV 4K (2nd generation and later), and Apple TV HD Impact: An app may be able to execute arbitrary code with kernel privileges Description: A race condition was addressed with improved state handling. CVE-2022-42864: Tommy Muir (@Muirey03) IOMobileFrameBuffer Available for: Apple TV 4K, Apple TV 4K (2nd generation and later), and Apple TV HD Impact: An app may be able to execute arbitrary code with kernel privileges Description: An out-of-bounds write issue was addressed with improved input validation. CVE-2022-46690: John Aakerblom (@jaakerblom) Kernel Available for: Apple TV 4K, Apple TV 4K (2nd generation and later), and Apple TV HD Impact: An app may be able to execute arbitrary code with kernel privileges Description: A race condition was addressed with additional validation. CVE-2022-46689: Ian Beer of Google Project Zero Kernel Available for: Apple TV 4K, Apple TV 4K (2nd generation and later), and Apple TV HD Impact: Connecting to a malicious NFS server may lead to arbitrary code execution with kernel privileges Description: The issue was addressed with improved bounds checks. CVE-2022-46701: Felix Poulin-Belanger Kernel Available for: Apple TV 4K, Apple TV 4K (2nd generation and later), and Apple TV HD Impact: A remote user may be able to cause kernel code execution Description: The issue was addressed with improved memory handling. CVE-2022-42842: pattern-f (@pattern_F_) of Ant Security Light-Year Lab Kernel Available for: Apple TV 4K, Apple TV 4K (2nd generation and later), and Apple TV HD Impact: An app with root privileges may be able to execute arbitrary code with kernel privileges Description: The issue was addressed with improved memory handling. CVE-2022-42845: Adam Doupé of ASU SEFCOM libxml2 Available for: Apple TV 4K, Apple TV 4K (2nd generation and later), and Apple TV HD Impact: A remote user may be able to cause unexpected app termination or arbitrary code execution Description: An integer overflow was addressed through improved input validation. CVE-2022-40303: Maddie Stone of Google Project Zero libxml2 Available for: Apple TV 4K, Apple TV 4K (2nd generation and later), and Apple TV HD Impact: A remote user may be able to cause unexpected app termination or arbitrary code execution Description: This issue was addressed with improved checks. CVE-2022-40304: Ned Williamson and Nathan Wachholz of Google Project Zero Preferences Available for: Apple TV 4K, Apple TV 4K (2nd generation and later), and Apple TV HD Impact: An app may be able to use arbitrary entitlements Description: A logic issue was addressed with improved state management. CVE-2022-42855: Ivan Fratric of Google Project Zero Safari Available for: Apple TV 4K, Apple TV 4K (2nd generation and later), and Apple TV HD Impact: Visiting a website that frames malicious content may lead to UI spoofing Description: A spoofing issue existed in the handling of URLs. CVE-2022-46695: KirtiKumar Anandrao Ramchandani Software Update Available for: Apple TV 4K, Apple TV 4K (2nd generation and later), and Apple TV HD Impact: A user may be able to elevate privileges Description: An access issue existed with privileged API calls. CVE-2022-42849: Mickey Jin (@patch1t) Weather Available for: Apple TV 4K, Apple TV 4K (2nd generation and later), and Apple TV HD Impact: An app may be able to read sensitive location information Description: The issue was addressed with improved handling of caches. CVE-2022-42866: an anonymous researcher WebKit Available for: Apple TV 4K, Apple TV 4K (2nd generation and later), and Apple TV HD Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: A use after free issue was addressed with improved memory management. WebKit Bugzilla: 245521 CVE-2022-42867: Maddie Stone of Google Project Zero WebKit Available for: Apple TV 4K, Apple TV 4K (2nd generation and later), and Apple TV HD Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: A memory consumption issue was addressed with improved memory handling. WebKit Bugzilla: 245466 CVE-2022-46691: an anonymous researcher WebKit Available for: Apple TV 4K, Apple TV 4K (2nd generation and later), and Apple TV HD Impact: Processing maliciously crafted web content may bypass Same Origin Policy Description: A logic issue was addressed with improved state management. WebKit Bugzilla: 246783 CVE-2022-46692: KirtiKumar Anandrao Ramchandani WebKit Available for: Apple TV 4K, Apple TV 4K (2nd generation and later), and Apple TV HD Impact: Processing maliciously crafted web content may result in the disclosure of process memory Description: The issue was addressed with improved memory handling. CVE-2022-42852: hazbinhotel working with Trend Micro Zero Day Initiative WebKit Available for: Apple TV 4K, Apple TV 4K (2nd generation and later), and Apple TV HD Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: A memory corruption issue was addressed with improved input validation. WebKit Bugzilla: 246942 CVE-2022-46696: Samuel Groß of Google V8 Security WebKit Bugzilla: 247562 CVE-2022-46700: Samuel Groß of Google V8 Security WebKit Available for: Apple TV 4K, Apple TV 4K (2nd generation and later), and Apple TV HD Impact: Processing maliciously crafted web content may disclose sensitive user information Description: A logic issue was addressed with improved checks. CVE-2022-46698: Dohyun Lee (@l33d0hyun) of SSD Secure Disclosure Labs & DNSLab, Korea Univ. WebKit Available for: Apple TV 4K, Apple TV 4K (2nd generation and later), and Apple TV HD Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: A memory corruption issue was addressed with improved state management. WebKit Bugzilla: 247420 CVE-2022-46699: Samuel Groß of Google V8 Security WebKit Bugzilla: 244622 CVE-2022-42863: an anonymous researcher WebKit Available for: Apple TV 4K, Apple TV 4K (2nd generation and later), and Apple TV HD Impact: Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.1. WebKit Bugzilla: 248266 CVE-2022-42856: Clément Lecigne of Google's Threat Analysis Group Additional recognition Kernel We would like to acknowledge Zweig of Kunlun Lab for their assistance. Safari Extensions We would like to acknowledge Oliver Dunk and Christian R. of 1Password for their assistance. WebKit We would like to acknowledge an anonymous researcher and scarlet for their assistance. Apple TV will periodically check for software updates. Alternatively, you may manually check for software updates by selecting "Settings -> System -> Software Update -> Update Software." To check the current version of software, select "Settings -> General -> About." All information is also posted on the Apple Security Updates web site: https://support.apple.com/en-us/HT201222. This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEBP+4DupqR5Sgt1DB4RjMIDkeNxkFAmOZFX4ACgkQ4RjMIDke NxkItA/+LIwJ66Odl7Uwp1N/qek5Z/TBuPKlbgTwRZGT3LBVMVmyHTBzebA88aNq Pae1RKQ2Txw4w9Tb7a08eeqRQD51MBoSjTxf23tO1o0B1UR3Hgq3gsOSjh/dTq9V Jvy4DpO15xdVHP3BH/li114JpgR+FoD5Du0rPffL01p6YtqeWMSvnRoCmwNcIqou i2ZObfdrL2WJ+IiDIlMoJ3v+B1tDxOWR6Mn37iRdzl+QgrQMQtP9pSsiAPCntA+y eFM5Hp0JlOMtCfA+xT+LRoZHCbjTCFMRlRbNffGvrNwwdTY4MXrSYlKcIo3yFT2m KSHrQNvqzWhmSLAcHlUNo0lVvtPAlrgyilCYaeRNgRC1+x8KRf/AcErXr23oKknJ lzIF6eVk1K3mxUmR+M+P8+cr14pbrUwJcQlm0In6/8fUulHtcElLE3fJ+HJVImx8 RtvNmuCng5iEK1zlwgDvAKO3EgMrMtduF8aygaCcBmt65GMkHwvOGCDXcIrKfH9U sP4eY7V3t4CQd9TX3Vlmt47MwRTSVuUtMcQeQPhEUTdUbM7UlvtW8igrLvkz9uPn CpuE2mzhd/dJANXvMFBR9A0ilAdJO1QD/uSWL+UbKq4BlyiW5etd8gObQfHqqW3C sh0EwxLh4ATicRS9btAJMwIfK/ulYDWp4yuIsUamDj/sN9xWvXY= =i2O9 -----END PGP SIGNATURE----- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Important: webkit2gtk3 security and bug fix update Advisory ID: RHSA-2023:2834-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2023:2834 Issue date: 2023-05-16 CVE Names: CVE-2022-32886 CVE-2022-32888 CVE-2022-32923 CVE-2022-42799 CVE-2022-42823 CVE-2022-42824 CVE-2022-42826 CVE-2022-42852 CVE-2022-42863 CVE-2022-42867 CVE-2022-46691 CVE-2022-46692 CVE-2022-46698 CVE-2022-46699 CVE-2022-46700 CVE-2023-23517 CVE-2023-23518 CVE-2023-25358 CVE-2023-25360 CVE-2023-25361 CVE-2023-25362 CVE-2023-25363 ==================================================================== 1. Summary: An update for webkit2gtk3 is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux AppStream (v. 8) - aarch64, ppc64le, s390x, x86_64 3. Description: WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.8 Release Notes linked from the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Package List: Red Hat Enterprise Linux AppStream (v. 8): Source: webkit2gtk3-2.38.5-1.el8.src.rpm aarch64: webkit2gtk3-2.38.5-1.el8.aarch64.rpm webkit2gtk3-debuginfo-2.38.5-1.el8.aarch64.rpm webkit2gtk3-debugsource-2.38.5-1.el8.aarch64.rpm webkit2gtk3-devel-2.38.5-1.el8.aarch64.rpm webkit2gtk3-devel-debuginfo-2.38.5-1.el8.aarch64.rpm webkit2gtk3-jsc-2.38.5-1.el8.aarch64.rpm webkit2gtk3-jsc-debuginfo-2.38.5-1.el8.aarch64.rpm webkit2gtk3-jsc-devel-2.38.5-1.el8.aarch64.rpm webkit2gtk3-jsc-devel-debuginfo-2.38.5-1.el8.aarch64.rpm ppc64le: webkit2gtk3-2.38.5-1.el8.ppc64le.rpm webkit2gtk3-debuginfo-2.38.5-1.el8.ppc64le.rpm webkit2gtk3-debugsource-2.38.5-1.el8.ppc64le.rpm webkit2gtk3-devel-2.38.5-1.el8.ppc64le.rpm webkit2gtk3-devel-debuginfo-2.38.5-1.el8.ppc64le.rpm webkit2gtk3-jsc-2.38.5-1.el8.ppc64le.rpm webkit2gtk3-jsc-debuginfo-2.38.5-1.el8.ppc64le.rpm webkit2gtk3-jsc-devel-2.38.5-1.el8.ppc64le.rpm webkit2gtk3-jsc-devel-debuginfo-2.38.5-1.el8.ppc64le.rpm s390x: webkit2gtk3-2.38.5-1.el8.s390x.rpm webkit2gtk3-debuginfo-2.38.5-1.el8.s390x.rpm webkit2gtk3-debugsource-2.38.5-1.el8.s390x.rpm webkit2gtk3-devel-2.38.5-1.el8.s390x.rpm webkit2gtk3-devel-debuginfo-2.38.5-1.el8.s390x.rpm webkit2gtk3-jsc-2.38.5-1.el8.s390x.rpm webkit2gtk3-jsc-debuginfo-2.38.5-1.el8.s390x.rpm webkit2gtk3-jsc-devel-2.38.5-1.el8.s390x.rpm webkit2gtk3-jsc-devel-debuginfo-2.38.5-1.el8.s390x.rpm x86_64: webkit2gtk3-2.38.5-1.el8.i686.rpm webkit2gtk3-2.38.5-1.el8.x86_64.rpm webkit2gtk3-debuginfo-2.38.5-1.el8.i686.rpm webkit2gtk3-debuginfo-2.38.5-1.el8.x86_64.rpm webkit2gtk3-debugsource-2.38.5-1.el8.i686.rpm webkit2gtk3-debugsource-2.38.5-1.el8.x86_64.rpm webkit2gtk3-devel-2.38.5-1.el8.i686.rpm webkit2gtk3-devel-2.38.5-1.el8.x86_64.rpm webkit2gtk3-devel-debuginfo-2.38.5-1.el8.i686.rpm webkit2gtk3-devel-debuginfo-2.38.5-1.el8.x86_64.rpm webkit2gtk3-jsc-2.38.5-1.el8.i686.rpm webkit2gtk3-jsc-2.38.5-1.el8.x86_64.rpm webkit2gtk3-jsc-debuginfo-2.38.5-1.el8.i686.rpm webkit2gtk3-jsc-debuginfo-2.38.5-1.el8.x86_64.rpm webkit2gtk3-jsc-devel-2.38.5-1.el8.i686.rpm webkit2gtk3-jsc-devel-2.38.5-1.el8.x86_64.rpm webkit2gtk3-jsc-devel-debuginfo-2.38.5-1.el8.i686.rpm webkit2gtk3-jsc-devel-debuginfo-2.38.5-1.el8.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2022-32886 https://access.redhat.com/security/cve/CVE-2022-32888 https://access.redhat.com/security/cve/CVE-2022-32923 https://access.redhat.com/security/cve/CVE-2022-42799 https://access.redhat.com/security/cve/CVE-2022-42823 https://access.redhat.com/security/cve/CVE-2022-42824 https://access.redhat.com/security/cve/CVE-2022-42826 https://access.redhat.com/security/cve/CVE-2022-42852 https://access.redhat.com/security/cve/CVE-2022-42863 https://access.redhat.com/security/cve/CVE-2022-42867 https://access.redhat.com/security/cve/CVE-2022-46691 https://access.redhat.com/security/cve/CVE-2022-46692 https://access.redhat.com/security/cve/CVE-2022-46698 https://access.redhat.com/security/cve/CVE-2022-46699 https://access.redhat.com/security/cve/CVE-2022-46700 https://access.redhat.com/security/cve/CVE-2023-23517 https://access.redhat.com/security/cve/CVE-2023-23518 https://access.redhat.com/security/cve/CVE-2023-25358 https://access.redhat.com/security/cve/CVE-2023-25360 https://access.redhat.com/security/cve/CVE-2023-25361 https://access.redhat.com/security/cve/CVE-2023-25362 https://access.redhat.com/security/cve/CVE-2023-25363 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.8_release_notes/index 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2023 Red Hat, Inc

Trust: 2.25

sources: NVD: CVE-2022-42852 // JVNDB: JVNDB-2022-023611 // VULHUB: VHN-439656 // PACKETSTORM: 170350 // PACKETSTORM: 170349 // PACKETSTORM: 170319 // PACKETSTORM: 170318 // PACKETSTORM: 170317 // PACKETSTORM: 172380

AFFECTED PRODUCTS

vendor:applemodel:safariscope:ltversion:16.2

Trust: 1.0

vendor:applemodel:tvosscope:ltversion:16.2

Trust: 1.0

vendor:applemodel:iphone osscope:ltversion:15.7.2

Trust: 1.0

vendor:applemodel:ipadosscope:gteversion:16.0

Trust: 1.0

vendor:applemodel:iphone osscope:ltversion:16.2

Trust: 1.0

vendor:applemodel:macosscope:eqversion:13.0

Trust: 1.0

vendor:applemodel:ipadosscope:ltversion:15.7.2

Trust: 1.0

vendor:applemodel:ipadosscope:ltversion:16.2

Trust: 1.0

vendor:applemodel:watchosscope:ltversion:9.2

Trust: 1.0

vendor:applemodel:iphone osscope:gteversion:16.0

Trust: 1.0

vendor:アップルmodel:tvosscope: - version: -

Trust: 0.8

vendor:アップルmodel:ipadosscope: - version: -

Trust: 0.8

vendor:アップルmodel:iosscope: - version: -

Trust: 0.8

vendor:アップルmodel:watchosscope:eqversion:9.2

Trust: 0.8

vendor:アップルmodel:macosscope: - version: -

Trust: 0.8

vendor:アップルmodel:safariscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-023611 // NVD: CVE-2022-42852

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-42852
value: MEDIUM

Trust: 1.0

NVD: CVE-2022-42852
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202212-3045
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2022-42852
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2022-42852
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2022-023611 // CNNVD: CNNVD-202212-3045 // NVD: CVE-2022-42852

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:Lack of information (CWE-noinfo) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2022-023611 // NVD: CVE-2022-42852

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202212-3045

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202212-3045

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-439656

PATCH

title:HT213536 Apple  Security updateurl:https://support.apple.com/en-us/HT213530

Trust: 0.8

sources: JVNDB: JVNDB-2022-023611

EXTERNAL IDS

db:NVDid:CVE-2022-42852

Trust: 3.9

db:PACKETSTORMid:170350

Trust: 0.8

db:PACKETSTORMid:170319

Trust: 0.8

db:JVNDBid:JVNDB-2022-023611

Trust: 0.8

db:PACKETSTORMid:170431

Trust: 0.7

db:AUSCERTid:ESB-2023.0118

Trust: 0.6

db:AUSCERTid:ESB-2023.1322

Trust: 0.6

db:AUSCERTid:ESB-2023.0058

Trust: 0.6

db:AUSCERTid:ESB-2023.1216

Trust: 0.6

db:CNNVDid:CNNVD-202212-3045

Trust: 0.6

db:PACKETSTORMid:170317

Trust: 0.2

db:PACKETSTORMid:170318

Trust: 0.2

db:PACKETSTORMid:170349

Trust: 0.2

db:PACKETSTORMid:170311

Trust: 0.1

db:PACKETSTORMid:170314

Trust: 0.1

db:PACKETSTORMid:170312

Trust: 0.1

db:VULHUBid:VHN-439656

Trust: 0.1

db:PACKETSTORMid:172380

Trust: 0.1

sources: VULHUB: VHN-439656 // JVNDB: JVNDB-2022-023611 // PACKETSTORM: 170350 // PACKETSTORM: 170349 // PACKETSTORM: 170319 // PACKETSTORM: 170318 // PACKETSTORM: 170317 // PACKETSTORM: 172380 // CNNVD: CNNVD-202212-3045 // NVD: CVE-2022-42852

REFERENCES

url:http://seclists.org/fulldisclosure/2022/dec/20

Trust: 2.5

url:http://seclists.org/fulldisclosure/2022/dec/21

Trust: 2.5

url:http://seclists.org/fulldisclosure/2022/dec/23

Trust: 2.5

url:http://seclists.org/fulldisclosure/2022/dec/26

Trust: 2.5

url:http://seclists.org/fulldisclosure/2022/dec/27

Trust: 2.5

url:http://seclists.org/fulldisclosure/2022/dec/28

Trust: 2.5

url:https://security.gentoo.org/glsa/202305-32

Trust: 2.4

url:https://support.apple.com/en-us/ht213536

Trust: 2.3

url:https://support.apple.com/en-us/ht213530

Trust: 1.7

url:https://support.apple.com/en-us/ht213531

Trust: 1.7

url:https://support.apple.com/en-us/ht213532

Trust: 1.7

url:https://support.apple.com/en-us/ht213535

Trust: 1.7

url:https://support.apple.com/en-us/ht213537

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2022-42852

Trust: 1.4

url:https://cxsecurity.com/cveshow/cve-2022-42852/

Trust: 0.6

url:https://vigilance.fr/vulnerability/webkitgtk-wpe-webkit-multiple-vulnerabilities-40179

Trust: 0.6

url:https://packetstormsecurity.com/files/170431/ubuntu-security-notice-usn-5797-1.html

Trust: 0.6

url:https://vigilance.fr/vulnerability/apple-ios-macos-multiple-vulnerabilities-of-december-2022-40105

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.1216

Trust: 0.6

url:https://packetstormsecurity.com/files/170319/apple-security-advisory-2022-12-13-9.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.0118

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.1322

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.0058

Trust: 0.6

url:https://packetstormsecurity.com/files/170350/debian-security-advisory-5309-1.html

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2022-42867

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2022-46692

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2022-42856

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2022-46698

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2022-46699

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2022-42863

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2022-46700

Trust: 0.3

url:https://www.apple.com/support/security/pgp/

Trust: 0.3

url:https://support.apple.com/en-us/ht201222.

Trust: 0.3

url:https://www.debian.org/security/faq

Trust: 0.2

url:https://www.debian.org/security/

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-46691

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-42849

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-42842

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-42845

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-40303

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-42865

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-42864

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-42843

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-40304

Trust: 0.2

url:https://security-tracker.debian.org/tracker/wpewebkit

Trust: 0.1

url:https://security-tracker.debian.org/tracker/webkit2gtk

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-46696

Trust: 0.1

url:https://support.apple.com/ht213537.

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-42866

Trust: 0.1

url:https://support.apple.com/kb/ht204641

Trust: 0.1

url:https://support.apple.com/ht213536.

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-42837

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-42859

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-42848

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-42855

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-42851

Trust: 0.1

url:https://support.apple.com/ht213535.

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.8_release_notes/index

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-25363

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-46698

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-32886

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-42826

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-23517

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-46700

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-32923

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-32888

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-25358

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-23518

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-42824

Trust: 0.1

url:https://bugzilla.redhat.com/):

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-42824

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-42823

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-32888

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:2834

Trust: 0.1

url:https://access.redhat.com/security/team/key/

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-25362

Trust: 0.1

url:https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-25361

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-32923

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-42826

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-46692

Trust: 0.1

url:https://access.redhat.com/security/team/contact/

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-25360

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-46691

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-42799

Trust: 0.1

url:https://access.redhat.com/articles/11258

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-42799

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-42863

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-42867

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-46699

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-32886

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-42852

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-42823

Trust: 0.1

sources: VULHUB: VHN-439656 // JVNDB: JVNDB-2022-023611 // PACKETSTORM: 170350 // PACKETSTORM: 170349 // PACKETSTORM: 170319 // PACKETSTORM: 170318 // PACKETSTORM: 170317 // PACKETSTORM: 172380 // CNNVD: CNNVD-202212-3045 // NVD: CVE-2022-42852

CREDITS

Apple

Trust: 0.3

sources: PACKETSTORM: 170319 // PACKETSTORM: 170318 // PACKETSTORM: 170317

SOURCES

db:VULHUBid:VHN-439656
db:JVNDBid:JVNDB-2022-023611
db:PACKETSTORMid:170350
db:PACKETSTORMid:170349
db:PACKETSTORMid:170319
db:PACKETSTORMid:170318
db:PACKETSTORMid:170317
db:PACKETSTORMid:172380
db:CNNVDid:CNNVD-202212-3045
db:NVDid:CVE-2022-42852

LAST UPDATE DATE

2025-04-14T21:30:02.580000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-439656date:2023-01-09T00:00:00
db:JVNDBid:JVNDB-2022-023611date:2023-11-29T03:37:00
db:CNNVDid:CNNVD-202212-3045date:2023-05-31T00:00:00
db:NVDid:CVE-2022-42852date:2023-05-30T06:15:29.040

SOURCES RELEASE DATE

db:VULHUBid:VHN-439656date:2022-12-15T00:00:00
db:JVNDBid:JVNDB-2022-023611date:2023-11-29T00:00:00
db:PACKETSTORMid:170350date:2023-01-02T14:20:15
db:PACKETSTORMid:170349date:2023-01-02T14:19:00
db:PACKETSTORMid:170319date:2022-12-22T02:13:43
db:PACKETSTORMid:170318date:2022-12-22T02:13:22
db:PACKETSTORMid:170317date:2022-12-22T02:12:53
db:PACKETSTORMid:172380date:2023-05-16T17:10:07
db:CNNVDid:CNNVD-202212-3045date:2022-12-13T00:00:00
db:NVDid:CVE-2022-42852date:2022-12-15T19:15:24.797