A logic issue was addressed with improved state management. This issue is fixed in macOS Monterey 12.7.6, macOS Sonoma 14.4, macOS Ventura 13.6.8. An attacker may be able to read information belonging to another user.
References
Link | Resource |
---|---|
http://seclists.org/fulldisclosure/2024/Jul/19 | Mailing List Third Party Advisory |
http://seclists.org/fulldisclosure/2024/Jul/20 | Mailing List Third Party Advisory |
https://support.apple.com/en-us/HT214084 | Release Notes Vendor Advisory |
https://support.apple.com/en-us/HT214118 | Release Notes Vendor Advisory |
https://support.apple.com/en-us/HT214120 | Release Notes Vendor Advisory |
https://support.apple.com/kb/HT214084 | Release Notes Vendor Advisory |
http://seclists.org/fulldisclosure/2024/Jul/19 | Mailing List Third Party Advisory |
http://seclists.org/fulldisclosure/2024/Jul/20 | Mailing List Third Party Advisory |
https://support.apple.com/en-us/HT214084 | Release Notes Vendor Advisory |
https://support.apple.com/en-us/HT214118 | Release Notes Vendor Advisory |
https://support.apple.com/en-us/HT214120 | Release Notes Vendor Advisory |
https://support.apple.com/kb/HT214084 | Release Notes Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 08:57
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/fulldisclosure/2024/Jul/19 - Mailing List, Third Party Advisory | |
References | () http://seclists.org/fulldisclosure/2024/Jul/20 - Mailing List, Third Party Advisory | |
References | () https://support.apple.com/en-us/HT214084 - Release Notes, Vendor Advisory | |
References | () https://support.apple.com/en-us/HT214118 - Release Notes, Vendor Advisory | |
References | () https://support.apple.com/en-us/HT214120 - Release Notes, Vendor Advisory | |
References | () https://support.apple.com/kb/HT214084 - Release Notes, Vendor Advisory |
12 Aug 2024, 15:38
Type | Values Removed | Values Added |
---|---|---|
First Time |
Apple
Apple macos |
|
CPE | cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* | |
CWE | NVD-CWE-noinfo | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
References | () http://seclists.org/fulldisclosure/2024/Jul/19 - Mailing List, Third Party Advisory | |
References | () http://seclists.org/fulldisclosure/2024/Jul/20 - Mailing List, Third Party Advisory | |
References | () https://support.apple.com/en-us/HT214084 - Release Notes, Vendor Advisory | |
References | () https://support.apple.com/en-us/HT214118 - Release Notes, Vendor Advisory | |
References | () https://support.apple.com/en-us/HT214120 - Release Notes, Vendor Advisory | |
References | () https://support.apple.com/kb/HT214084 - Release Notes, Vendor Advisory |
30 Jul 2024, 13:32
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
30 Jul 2024, 02:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
30 Jul 2024, 01:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
29 Jul 2024, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-29 23:15
Updated : 2024-11-21 08:57
NVD link : CVE-2024-23261
Mitre link : CVE-2024-23261
CVE.ORG link : CVE-2024-23261
JSON object : View
Products Affected
apple
- macos
CWE