The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.6.7, macOS Monterey 12.7.5, iOS 16.7.8 and iPadOS 16.7.8, tvOS 17.5, visionOS 1.2, iOS 17.5 and iPadOS 17.5, watchOS 10.5. An attacker that has already achieved kernel code execution may be able to bypass kernel memory protections.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 09:05
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/fulldisclosure/2024/Jun/5 - Mailing List, Third Party Advisory | |
References | () https://support.apple.com/en-us/HT214100 - Vendor Advisory | |
References | () https://support.apple.com/en-us/HT214101 - Vendor Advisory | |
References | () https://support.apple.com/en-us/HT214102 - Vendor Advisory | |
References | () https://support.apple.com/en-us/HT214104 - Vendor Advisory | |
References | () https://support.apple.com/en-us/HT214105 - Vendor Advisory | |
References | () https://support.apple.com/en-us/HT214107 - Vendor Advisory | |
References | () https://support.apple.com/en-us/HT214108 - Vendor Advisory | |
References | () https://support.apple.com/kb/HT214100 - Vendor Advisory | |
References | () https://support.apple.com/kb/HT214101 - Vendor Advisory | |
References | () https://support.apple.com/kb/HT214102 - Vendor Advisory | |
References | () https://support.apple.com/kb/HT214104 - Vendor Advisory | |
References | () https://support.apple.com/kb/HT214105 - Vendor Advisory | |
References | () https://support.apple.com/kb/HT214107 - Vendor Advisory | |
References | () https://support.apple.com/kb/HT214108 - Vendor Advisory |
03 Jul 2024, 16:27
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/fulldisclosure/2024/Jun/5 - Mailing List, Third Party Advisory | |
References | () https://support.apple.com/en-us/HT214100 - Vendor Advisory | |
References | () https://support.apple.com/en-us/HT214101 - Vendor Advisory | |
References | () https://support.apple.com/en-us/HT214102 - Vendor Advisory | |
References | () https://support.apple.com/en-us/HT214104 - Vendor Advisory | |
References | () https://support.apple.com/en-us/HT214105 - Vendor Advisory | |
References | () https://support.apple.com/en-us/HT214107 - Vendor Advisory | |
References | () https://support.apple.com/en-us/HT214108 - Vendor Advisory | |
References | () https://support.apple.com/kb/HT214100 - Vendor Advisory | |
References | () https://support.apple.com/kb/HT214101 - Vendor Advisory | |
References | () https://support.apple.com/kb/HT214102 - Vendor Advisory | |
References | () https://support.apple.com/kb/HT214104 - Vendor Advisory | |
References | () https://support.apple.com/kb/HT214105 - Vendor Advisory | |
References | () https://support.apple.com/kb/HT214107 - Vendor Advisory | |
References | () https://support.apple.com/kb/HT214108 - Vendor Advisory | |
CWE | NVD-CWE-noinfo | |
CPE | cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:* cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:* cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.3 |
First Time |
Apple tvos
Apple iphone Os Apple watchos Apple macos Apple ipados Apple Apple visionos |
03 Jul 2024, 01:51
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
CWE | CWE-786 |
12 Jun 2024, 04:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
11 Jun 2024, 13:54
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
11 Jun 2024, 08:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
10 Jun 2024, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-10 21:15
Updated : 2024-11-21 09:05
NVD link : CVE-2024-27840
Mitre link : CVE-2024-27840
CVE.ORG link : CVE-2024-27840
JSON object : View
Products Affected
apple
- visionos
- iphone_os
- watchos
- tvos
- macos
- ipados
CWE