First published: Mon May 13 2024(Updated: )
Apple Neural Engine. The issue was addressed with improved memory handling.
Credit: product-security@apple.com Minghao Lin Baidu Security Baidu SecurityYe Zhang @VAR10CK Baidu SecurityMeysam Firouzi @R00tkitSMM Mickey Jin @patch1t an anonymous researcher Kirin @Pwnrin 小来来 @Smi1eSEC pattern-f @pattern_F_ Ant Security LightAmir Bazine CrowdStrike Counter Adversary OperationsKarsten König CrowdStrike Counter Adversary OperationsLucas Monteiro Daniel Monteiro Felipe Monteiro Alexander Heinrich SEEMOO TU Darmstadt @Sn0wfreeze Shai Mishali @freak4pc CertiK SkyFall Team Junsung Lee Trend Micro Zero Day InitiativePan ZhenPeng @Peterpan0927 STAR Labs SG Ptean anonymous researcher MIT CSAIL MIT CSAILJoseph Ravichandran @0xjprx MIT CSAILPr BarPr Hebrew UniversityEP Nick Wellnhofer Gil Pedersen Dohyun Lee @l33d0hyun LFY @secsys Fudan UniversityTalal Haj Bakry Mysk IncTommy Mysk @mysk_co Mysk IncDaniel Zajork Joshua Zajork Meysam Firouzi @R00tkitsmm Trend Micro Zero Day InitiativeMichael DePlante @izobashi Trend Micro Zero Day InitiativeAndr.Ess Adam Berry Csaba Fitzl @theevilbit KandjiLFY @secsys yulige Snoolie Keffaber @0xilis Robert Reichel Srijan Poudel CVE-2024-27806 Abhay Kailasia @abhay_kailasia Lakshmi Narain College of Technology BhopalRomy R. ajajfxhj Maksymilian Motyl Immunity SystemsManfred Paul @_manfp Trend Micro's Zero Day InitiativeEmilio Cobos MozillaLukas Bernhard CISPA Helmholtz Center for Information SecurityManfred Paul @_manfp Trend Micro Zero Day InitiativeNan Wang @eternalsakura13 360 Vulnerability Research InstituteJoe Rutkowski @Joe12387 Crawless @abrahamjuliot Jeff Johnson underpassappDalibor Milanovic Narendra Bhati Suma Soft PvtShaheen Fazim CVE-2024-23296 Ron Masas ImpervaScott Johnson RIPEDA ConsultingMykola Grymalyuk RIPEDA ConsultingJordy Witteman Carlos Polop Pedro Tôrres @t0rr3sp3dr0 Yann GASCUEL Alter SolutionsPwn2car Trend Micro's Zero Day Initiative Trend Micro's Zero Day InitiativeMichael DePlante @izobashi Trend Micro's Zero Day Initiative
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/webkit2gtk | <2.44.2-0ubuntu0.22.04.1 | 2.44.2-0ubuntu0.22.04.1 |
ubuntu/webkit2gtk | <2.44.2-0ubuntu0.23.10.1 | 2.44.2-0ubuntu0.23.10.1 |
ubuntu/webkit2gtk | <2.44.2-0ubuntu0.24.04.1 | 2.44.2-0ubuntu0.24.04.1 |
ubuntu/webkit2gtk | <2.44.2 | 2.44.2 |
debian/webkit2gtk | <=2.36.4-1~deb10u1<=2.38.6-0+deb10u1<=2.42.2-1~deb11u1<=2.42.2-1~deb12u1 | 2.44.2-1~deb11u1 2.44.2-1~deb12u1 2.44.2-1 |
debian/wpewebkit | <=2.38.6-1~deb11u1<=2.38.6-1 | 2.44.2-1 |
Apple macOS | <14.5 | 14.5 |
tvOS | <17.5 | 17.5 |
Apple Mobile Safari | <17.5 | 17.5 |
Apple iOS, iPadOS, and watchOS | <16.7.8 | 16.7.8 |
Apple iOS, iPadOS, and watchOS | <16.7.8 | 16.7.8 |
Apple iOS, iPadOS, and watchOS | <17.5 | 17.5 |
Apple iOS, iPadOS, and watchOS | <17.5 | 17.5 |
Apple iOS, iPadOS, and watchOS | <10.5 | 10.5 |
Apple Mobile Safari | <17.5 | |
Apple iOS, iPadOS, and watchOS | <17.5 | |
iOS | <17.5 | |
Apple iOS and macOS | >=14.0<14.5 | |
tvOS | <17.5 | |
Apple iOS, iPadOS, and watchOS | <10.5 | |
WebKitGTK+ | <2.44.2 | |
wpewebkit WPE WebKit | <2.44.2 | |
Fedora | =39 | |
Fedora | =40 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2024-27834 has been evaluated as a significant vulnerability allowing potential bypass of Pointer Authentication.
To fix CVE-2024-27834, upgrade your software to the latest versions such as iOS 17.5, iPadOS 17.5, tvOS 17.5, macOS Sonoma 14.5, Safari 17.5, or the updated versions of WebKitGTK as specified.
CVE-2024-27834 affects various platforms including iOS, iPadOS, tvOS, watchOS, macOS, and specific versions of WebKitGTK.
CVE-2024-27834 is a vulnerability related to the potential bypass of Pointer Authentication through arbitrary read and write capabilities.
CVE-2024-27834 was disclosed alongside the release of fixes in 2024 for multiple Apple and WebKitGTK products.