{"uuid": "7aaf1807-5ae0-4632-a842-be67fae7afca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-32948", "type": "published-proof-of-concept", "source": "https://t.me/weareaig/334", "content": "kernel r/w exploit for iOS 15 and macOS 12 \n\n\nCVE-2022-32845 : aned signature check bypass for model.hwx.\nCVE-2022-32948 : DeCxt::FileIndexToWeight() OOB Read due to lack of array index validation.\nCVE-2022-42805 : ZinComputeProgramUpdateMutables() potential arbitrary read due to Integer overflow issue.\nCVE-2022-32899 : DeCxt::RasterizeScaleBiasData() Buffer underflow due to integer overflow issue.\n\n\ud83d\udcf1\niPhone12 Pro (iPhone13,3) with iOS 15.5.\niPad Pro (iPad8,10) with iPadOS 15.5.\niPhone11 Pro (iPhone12,3) with iOS 15.4.1.\nMacBookAir10,1 M1 with macOS 12.4.", "creation_timestamp": "2022-12-22T15:41:35.000000Z"}