![]() ![]() This issue was addressed with improved validation of symlinks.ĬVE-2021-30855: Zhipeng Huo and Yuebin Sun of Tencent Security Xuanwu Lab ()Īvailable for: iPhone SE (1st generation), iPad Pro 12.9-inch, iPad Air 2, iPad (5th generation), and iPad mini 4 Impact: An application may be able to access restricted filesĭescription: A validation issue existed in the handling of symlinks. Impact: A remote attacker may be able to cause a denial of serviceĭescription: This issue was addressed by updating expat to version 2.4.1. Impact: A malicious application may be able to execute arbitrary code with kernel privilegesĭescription: A race condition was addressed with improved locking.ĬVE-2021-30857: Manish Bhatt of Red Team X Zweig of Kunlun LabĮntry added September 20, 2021, updated May 25, 2022ĭescription: A type confusion issue was addressed with improved state handling. Impact: Processing maliciously crafted web content may lead to arbitrary code executionĭescription: A type confusion issue was addressed with improved memory handling.ĬVE-2021-30852: Yinyi Wu of Ant Security Light-Year Lab Impact: Processing a maliciously crafted dfont file may lead to arbitrary code executionĭescription: This issue was addressed with improved checks.ĬVE-2021-30841: Xingwei Lin of Ant Security Light-Year LabĬVE-2021-30843: Xingwei Lin of Ant Security Light-Year LabĬVE-2021-30842: Xingwei Lin of Ant Security Light-Year Lab ![]() Impact: A sandboxed process may be able to circumvent sandbox restrictions. Apple was aware of a report that this issue may have been actively exploited at the time of release.ĭescription: A deserialization issue was addressed through improved validation.ĬVE-2021-31010: Citizen Lab and Google Project Zero ![]() Impact: A sandboxed process may be able to circumvent sandbox restrictionsĬVE-2021-30864: Ron Hass of Perception Point, Ron Waisberg added May 25, 2022 Apple is aware of a report that this issue may have been actively exploited.ĭescription: An integer overflow was addressed with improved input validation.Īvailable for: Available for devices with Apple Neural Engine: iPhone 8 and later, iPad Pro (3rd generation) and later, iPad Air (3rd generation) and later, and iPad mini (5th generation) Impact: Processing a maliciously crafted PDF may lead to arbitrary code execution. Impact: Processing a maliciously crafted image may lead to arbitrary code executionĭescription: A memory corruption issue was addressed with improved input validation.ĬVE-2021-30928: Mickey Jin of Trend Micro Impact: Processing a malicious audio file may result in unexpected application termination or arbitrary code executionĬVE-2021-30834: JunDong Xie of Ant Security Light-Year Lab Impact: Processing a maliciously crafted file may disclose user informationĭescription: An out-of-bounds read was addressed with improved bounds checking.ĬVE-2021-30905: Mickey Jin of Trend Micro ![]() Impact: A remote attacker may be able to cause arbitrary code executionĭescription: A logic issue was addressed with improved state management.ĬVE-2021-30820: Jianjun Dai of Qihoo 360 Alpha Lab Impact: A malicious application may be able to execute arbitrary code with system privilegesĭescription: A memory corruption issue was addressed with improved memory handling.Īvailable for: iPhone 6s and later, iPad Pro (all models), iPad Air 2 and later, iPad 5th generation and later, iPad mini 4 and later, and iPod touch (7th generation) Available for devices with Apple Neural Engine: iPhone 8 and later, iPad Pro (3rd generation) and later, iPad Air (3rd generation) and later, and iPad mini (5th generation) ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |