A race condition was addressed with additional validation. This issue is fixed in macOS Ventura 13.6.8, iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, macOS Sonoma 14.6. A malicious attacker with arbitrary read and write capability may be able to bypass Pointer Authentication.
References
Link | Resource |
---|---|
http://seclists.org/fulldisclosure/2024/Jul/16 | Mailing List Third Party Advisory |
http://seclists.org/fulldisclosure/2024/Jul/18 | Mailing List Third Party Advisory |
http://seclists.org/fulldisclosure/2024/Jul/19 | Mailing List Third Party Advisory |
http://seclists.org/fulldisclosure/2024/Jul/21 | Mailing List Third Party Advisory |
http://seclists.org/fulldisclosure/2024/Jul/22 | Mailing List Third Party Advisory |
https://support.apple.com/en-us/HT214117 | Release Notes Vendor Advisory |
https://support.apple.com/en-us/HT214119 | Release Notes Vendor Advisory |
https://support.apple.com/en-us/HT214120 | Release Notes Vendor Advisory |
https://support.apple.com/en-us/HT214122 | Release Notes Vendor Advisory |
https://support.apple.com/en-us/HT214124 | Release Notes Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
15 Aug 2024, 16:14
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/fulldisclosure/2024/Jul/16 - Mailing List, Third Party Advisory | |
References | () http://seclists.org/fulldisclosure/2024/Jul/18 - Mailing List, Third Party Advisory | |
References | () http://seclists.org/fulldisclosure/2024/Jul/19 - Mailing List, Third Party Advisory | |
References | () http://seclists.org/fulldisclosure/2024/Jul/21 - Mailing List, Third Party Advisory | |
References | () http://seclists.org/fulldisclosure/2024/Jul/22 - Mailing List, Third Party Advisory | |
References | () https://support.apple.com/en-us/HT214117 - Release Notes, Vendor Advisory | |
References | () https://support.apple.com/en-us/HT214119 - Release Notes, Vendor Advisory | |
References | () https://support.apple.com/en-us/HT214120 - Release Notes, Vendor Advisory | |
References | () https://support.apple.com/en-us/HT214122 - Release Notes, Vendor Advisory | |
References | () https://support.apple.com/en-us/HT214124 - Release Notes, Vendor Advisory | |
First Time |
Apple macos
Apple watchos Apple iphone Os Apple tvos Apple Apple ipados |
|
CPE | cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:* cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
CWE | CWE-362 |
30 Jul 2024, 13:32
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
30 Jul 2024, 02:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
30 Jul 2024, 01:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
29 Jul 2024, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-29 23:15
Updated : 2024-08-15 16:14
NVD link : CVE-2024-40815
Mitre link : CVE-2024-40815
CVE.ORG link : CVE-2024-40815
JSON object : View
Products Affected
apple
- macos
- watchos
- iphone_os
- ipados
- tvos
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')