cvelist/2023/32xxx/CVE-2023-32424.json

81 lines
2.8 KiB
JSON
Raw Normal View History

2023-05-08 23:00:36 +00:00
{
2024-01-10 23:00:37 +00:00
"data_version": "4.0",
2023-05-08 23:00:36 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-32424",
2024-01-10 23:00:37 +00:00
"ASSIGNER": "product-security@apple.com",
"STATE": "PUBLIC"
2023-05-08 23:00:36 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2024-01-10 23:00:37 +00:00
"value": "The issue was addressed with improved memory handling. This issue is fixed in iOS 16.4 and iPadOS 16.4, watchOS 9.4. An attacker that has already achieved kernel code execution may be able to bypass kernel memory mitigations."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "An attacker that has already achieved kernel code execution may be able to bypass kernel memory mitigations"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Apple",
"product": {
"product_data": [
{
"product_name": "iOS and iPadOS",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "unspecified",
"version_value": "16.4"
}
]
}
},
{
"product_name": "watchOS",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "unspecified",
"version_value": "9.4"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://support.apple.com/en-us/HT213676",
"refsource": "MISC",
"name": "https://support.apple.com/en-us/HT213676"
},
{
"url": "https://support.apple.com/en-us/HT213678",
"refsource": "MISC",
"name": "https://support.apple.com/en-us/HT213678"
2023-05-08 23:00:36 +00:00
}
]
}
}