The issue was addressed with improved checks. This issue is fixed in iOS 17.5 and iPadOS 17.5, tvOS 17.5, Safari 17.5, watchOS 10.5, macOS Sonoma 14.5. An attacker with arbitrary read and write capability may be able to bypass Pointer Authentication.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
12 Dec 2024, 14:33
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* | |
First Time |
Apple ipados
|
09 Dec 2024, 19:27
Type | Values Removed | Values Added |
---|---|---|
First Time |
Webkitgtk webkitgtk
Fedoraproject Apple ipad Os Apple Apple macos Webkitgtk Fedoraproject fedora Wpewebkit wpe Webkit Apple tvos Apple safari Apple watchos Apple iphone Os Wpewebkit |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
CWE | NVD-CWE-noinfo | |
CPE | cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* cpe:2.3:a:wpewebkit:wpe_webkit:*:*:*:*:*:*:*:* cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:* cpe:2.3:a:webkitgtk:webkitgtk:*:*:*:*:*:*:*:* cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:* cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:* cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:* cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:* |
|
References | () https://support.apple.com/en-us/HT214102 - Vendor Advisory | |
References | () https://support.apple.com/en-us/HT214106 - Vendor Advisory | |
References | () http://seclists.org/fulldisclosure/2024/May/17 - Mailing List | |
References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ADCLQW54XN37VJZNYD3UKCYATJFIMYXG/ - Mailing List | |
References | () http://seclists.org/fulldisclosure/2024/May/10 - Mailing List | |
References | () http://www.openwall.com/lists/oss-security/2024/05/21/1 - Mailing List | |
References | () https://support.apple.com/en-us/HT214103 - Vendor Advisory | |
References | () http://seclists.org/fulldisclosure/2024/May/16 - Mailing List | |
References | () https://support.apple.com/en-us/HT214104 - Vendor Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WKIXADCW3O4R2OOSDZGPU55XQFE6NA3M/ - Mailing List | |
References | () http://seclists.org/fulldisclosure/2024/May/12 - Mailing List | |
References | () http://seclists.org/fulldisclosure/2024/May/9 - Mailing List | |
References | () https://support.apple.com/en-us/HT214101 - Vendor Advisory |
22 Jun 2024, 02:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
19 Jun 2024, 03:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
10 Jun 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
10 Jun 2024, 17:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
14 May 2024, 16:13
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-14 15:13
Updated : 2024-12-12 14:33
NVD link : CVE-2024-27834
Mitre link : CVE-2024-27834
JSON object : View
Products Affected
apple
- watchos
- tvos
- ipados
- safari
- macos
- iphone_os
fedoraproject
- fedora
webkitgtk
- webkitgtk
wpewebkit
- wpe_webkit
CWE