THREATINT

We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Fathom (Privacy friendly web analytics)
Zendesk (Helpdesk and Chat)

Ok

Home | EN
Support
CVE
PUBLISHED

CVE-2024-27840

Assignerapple
Reserved2024-02-26
Published2024-06-10
Updated2024-06-14

Description

The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.6.7, macOS Monterey 12.7.5, iOS 16.7.8 and iPadOS 16.7.8, tvOS 17.5, visionOS 1.2, iOS 17.5 and iPadOS 17.5, watchOS 10.5. An attacker that has already achieved kernel code execution may be able to bypass kernel memory protections.

Problem types

An attacker that has already achieved kernel code execution may be able to bypass kernel memory protections

Product status

Any version before 17.5
affected

Any version before 16.7
affected

Any version before 13.6
affected

Any version before 12.7
affected

Any version before 1.2
affected

Any version before 10.5
affected

Any version before 17.5
affected

References

https://support.apple.com/en-us/HT214101

https://support.apple.com/en-us/HT214100

https://support.apple.com/en-us/HT214107

https://support.apple.com/en-us/HT214105

https://support.apple.com/en-us/HT214108

https://support.apple.com/en-us/HT214104

https://support.apple.com/en-us/HT214102

https://support.apple.com/kb/HT214107

https://support.apple.com/kb/HT214102

https://support.apple.com/kb/HT214104

https://support.apple.com/kb/HT214105

https://support.apple.com/kb/HT214100

https://support.apple.com/kb/HT214101

https://support.apple.com/kb/HT214108

http://seclists.org/fulldisclosure/2024/Jun/5

cve.org CVE-2024-27840

nvd.nist.gov CVE-2024-27840

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-27840
© Copyright 2024 THREATINT. Made in Cyprus with +