

APPLE WEBKIT CODE
Impact: An attacker may be able to cause unexpected application termination or arbitrary code executionĭescription: An integer overflow was addressed with improved input validation.ĬVE-2022-26775: Max Shavrick of the Google Security Teamĭescription: This issue was addressed with improved checks.ĬVE-2022-26708: Max Shavrick of the Google Security Team Impact: A sandboxed process may be able to circumvent sandbox restrictionsĭescription: An access issue was addressed with additional sandbox restrictions on third-party applications.ĬVE-2022-26706: Arsenii Kostromin (0x3c3e) Impact: A malicious attacker with arbitrary read and write capability may be able to bypass Pointer Authenticationĭescription: A race condition was addressed with improved state handling.ĬVE-2022-26765: Linus Henze of Pinauten GmbH () Impact: An attacker that has already achieved kernel code execution may be able to bypass kernel memory mitigationsĬVE-2022-26764: Linus Henze of Pinauten GmbH ()
APPLE WEBKIT PRO
Impact: A malicious application may be able to execute arbitrary code with kernel privilegesĭescription: A memory corruption issue was addressed with improved validation.ĬVE-2022-26714: Peter Nguyễn Vũ Hoàng of STAR Labs for: iPhone 6s and later, iPad Pro (all models), iPad Air 2 and later, iPad 5th generation and later, iPad mini 4 and later, and iPod touch (7th generation)ĬVE-2022-26757: Ned Williamson of Google Project Zero Impact: A remote attacker may be able to cause unexpected application termination or arbitrary code executionĭescription: An integer overflow issue was addressed with improved input validation.ĬVE-2022-26711: actae0n of Blacksun Hackers Club working with Trend Micro Zero Day Initiativeĭescription: A race condition was addressed with improved locking.ĬVE-2022-26701: chenyuwang of Tencent Security Xuanwu Lab Impact: A malicious application may be able to execute arbitrary code with system privilegesĭescription: An out-of-bounds access issue was addressed with improved bounds checking.ĬVE-2022-26763: Linus Henze of Pinauten GmbH ()ĭescription: A memory corruption issue was addressed with improved state management. Impact: Processing a maliciously crafted image may lead to arbitrary code executionĭescription: A memory corruption issue was addressed with improved input validation.ĬVE-2022-26751: Michael DePlante of Trend Micro Zero Day Initiativeĭescription: An out-of-bounds write issue was addressed with improved bounds checking.

APPLE WEBKIT FREE
Impact: An application may be able to execute arbitrary code with kernel privilegesĭescription: A use after free issue was addressed with improved memory management. Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2 and later, iPad 5th generation and later, iPad mini 4 and later, and iPod touch (7th generation)
