exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Apple Security Advisory 2022-03-31-2

Apple Security Advisory 2022-03-31-2
Posted Apr 1, 2022
Authored by Apple | Site apple.com

Apple Security Advisory 2022-03-31-2 - macOS Monterey 12.3.1 addresses code execution, out of bounds read, and out of bounds write vulnerabilities.

tags | advisory, vulnerability, code execution
systems | apple
advisories | CVE-2022-22674, CVE-2022-22675
SHA-256 | b9a80f2423ee047562e675855fb77e8e541ddbeb9be931ee062b9739269afae4

Apple Security Advisory 2022-03-31-2

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

APPLE-SA-2022-03-31-2 macOS Monterey 12.3.1

macOS Monterey 12.3.1 addresses the following issues.
Information about the security content is also available at
https://support.apple.com/HT213220.

Released March 31, 2022

AppleAVD
Available for: macOS Monterey
Impact: An application may be able to execute arbitrary code
with kernel privileges. Apple is aware of a report that this issue
may have been actively exploited.
Description: An out-of-bounds write issue was addressed with
improved bounds checking.
CVE-2022-22675: an anonymous researcher

Intel Graphics Driver
Available for: macOS Monterey
Impact: An application may be able to read kernel memory
Description: An out-of-bounds read issue may lead to the
disclosure of kernel memory and was addressed with improved
input validation. Apple is aware of a report that this issue may
have been actively exploited.
CVE-2022-22674: an anonymous researcher

macOS Monterey 12.3 may be obtained from the Mac App
Store or Apple’s Software Downloads web site:
https://support.apple.com/downloads/

All information is also posted on the Apple Security Updates
web site:
https://support.apple.com/en-us/HT201222.

This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/

-----BEGIN PGP SIGNATURE-----
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=7eDI
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    17 Files
  • 21
    May 21st
    18 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close