The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.1, watchOS 9.2, iOS 16.2 and iPadOS 16.2, tvOS 16.2. An attacker with arbitrary read and write capability may be able to bypass Pointer Authentication. Apple is aware of a report that this issue may have been exploited against versions of iOS released before iOS 15.7.1.
The product checks the state of a resource before using that resource, but the resource’s state can change between the check and the use in a way that invalidates the results of the check. This can cause the product to perform invalid actions when the resource is in an unexpected state.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Ipados | Apple | * | 16.2 (excluding) |
Iphone_os | Apple | * | 16.2 (excluding) |
Macos | Apple | 13.0 (including) | 13.1 (excluding) |
Tvos | Apple | * | 16.2 (excluding) |
Watchos | Apple | * | 9.2 (excluding) |