2024-07-30 14:03:15 +00:00

61 lines
2.1 KiB
JSON

{
"id": "CVE-2024-40815",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:13.523",
"lastModified": "2024-07-30T13:32:45.943",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A race condition was addressed with additional validation. This issue is fixed in macOS Ventura 13.6.8, iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, macOS Sonoma 14.6. A malicious attacker with arbitrary read and write capability may be able to bypass Pointer Authentication."
},
{
"lang": "es",
"value": " Se abord\u00f3 una condici\u00f3n de ejecuci\u00f3n con validaci\u00f3n adicional. Este problema se solucion\u00f3 en macOS Ventura 13.6.8, iOS 17.6 y iPadOS 17.6, watchOS 10.6, tvOS 17.6, macOS Sonoma 14.6. Un atacante malicioso con capacidad de lectura y escritura arbitraria puede omitir la autenticaci\u00f3n de puntero."
}
],
"metrics": {},
"references": [
{
"url": "http://seclists.org/fulldisclosure/2024/Jul/16",
"source": "product-security@apple.com"
},
{
"url": "http://seclists.org/fulldisclosure/2024/Jul/18",
"source": "product-security@apple.com"
},
{
"url": "http://seclists.org/fulldisclosure/2024/Jul/19",
"source": "product-security@apple.com"
},
{
"url": "http://seclists.org/fulldisclosure/2024/Jul/21",
"source": "product-security@apple.com"
},
{
"url": "http://seclists.org/fulldisclosure/2024/Jul/22",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214117",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214119",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214120",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214122",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT214124",
"source": "product-security@apple.com"
}
]
}