{ "id": "CVE-2024-40815", "sourceIdentifier": "product-security@apple.com", "published": "2024-07-29T23:15:13.523", "lastModified": "2024-07-30T13:32:45.943", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A race condition was addressed with additional validation. This issue is fixed in macOS Ventura 13.6.8, iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, macOS Sonoma 14.6. A malicious attacker with arbitrary read and write capability may be able to bypass Pointer Authentication." }, { "lang": "es", "value": " Se abord\u00f3 una condici\u00f3n de ejecuci\u00f3n con validaci\u00f3n adicional. Este problema se solucion\u00f3 en macOS Ventura 13.6.8, iOS 17.6 y iPadOS 17.6, watchOS 10.6, tvOS 17.6, macOS Sonoma 14.6. Un atacante malicioso con capacidad de lectura y escritura arbitraria puede omitir la autenticaci\u00f3n de puntero." } ], "metrics": {}, "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Jul/16", "source": "product-security@apple.com" }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/18", "source": "product-security@apple.com" }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/19", "source": "product-security@apple.com" }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/21", "source": "product-security@apple.com" }, { "url": "http://seclists.org/fulldisclosure/2024/Jul/22", "source": "product-security@apple.com" }, { "url": "https://support.apple.com/en-us/HT214117", "source": "product-security@apple.com" }, { "url": "https://support.apple.com/en-us/HT214119", "source": "product-security@apple.com" }, { "url": "https://support.apple.com/en-us/HT214120", "source": "product-security@apple.com" }, { "url": "https://support.apple.com/en-us/HT214122", "source": "product-security@apple.com" }, { "url": "https://support.apple.com/en-us/HT214124", "source": "product-security@apple.com" } ] }