CVE-2024-27834
14.05.2024, 15:13
The issue was addressed with improved checks. This issue is fixed in iOS 17.5 and iPadOS 17.5, tvOS 17.5, Safari 17.5, watchOS 10.5, macOS Sonoma 14.5. An attacker with arbitrary read and write capability may be able to bypass Pointer Authentication.Enginsight
Vendor | Product | Version |
---|---|---|
apple | safari | 𝑥 < 17.5 |
apple | ipados | 𝑥 < 17.5 |
apple | iphone_os | 𝑥 < 17.5 |
apple | macos | 14.0 ≤ 𝑥 < 14.5 |
apple | tvos | 𝑥 < 17.5 |
apple | watchos | 𝑥 < 10.5 |
webkitgtk | webkitgtk | 𝑥 < 2.44.2 |
wpewebkit | wpe_webkit | 𝑥 < 2.44.2 |
𝑥
= Vulnerable software versions

Debian Releases
Debian Product | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
webkit2gtk |
| ||||||||||||
wpewebkit |
|

Ubuntu Releases
Ubuntu Product | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
qtwebkit-opensource-src |
| ||||||||||||
qtwebkit-source |
| ||||||||||||
webkit2gtk |
| ||||||||||||
webkitgtk |
| ||||||||||||
wpewebkit |
|
Common Weakness Enumeration
References