An information disclosure issue was addressed with improved private data redaction for log entries. This issue is fixed in iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, visionOS 1.3, macOS Sonoma 14.6. A local attacker may be able to determine kernel memory layout.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 09:05
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/fulldisclosure/2024/Jul/16 - Mailing List, Third Party Advisory | |
References | () http://seclists.org/fulldisclosure/2024/Jul/18 - Mailing List, Third Party Advisory | |
References | () http://seclists.org/fulldisclosure/2024/Jul/21 - Mailing List, Third Party Advisory | |
References | () http://seclists.org/fulldisclosure/2024/Jul/22 - Mailing List, Third Party Advisory | |
References | () http://seclists.org/fulldisclosure/2024/Jul/23 - Mailing List, Third Party Advisory | |
References | () https://support.apple.com/en-us/HT214117 - Release Notes, Vendor Advisory | |
References | () https://support.apple.com/en-us/HT214119 - Release Notes, Vendor Advisory | |
References | () https://support.apple.com/en-us/HT214122 - Release Notes, Vendor Advisory | |
References | () https://support.apple.com/en-us/HT214123 - Release Notes, Vendor Advisory | |
References | () https://support.apple.com/en-us/HT214124 - Release Notes, Vendor Advisory |
12 Aug 2024, 15:07
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:* cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:* cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
References | () http://seclists.org/fulldisclosure/2024/Jul/16 - Mailing List, Third Party Advisory | |
References | () http://seclists.org/fulldisclosure/2024/Jul/18 - Mailing List, Third Party Advisory | |
References | () http://seclists.org/fulldisclosure/2024/Jul/21 - Mailing List, Third Party Advisory | |
References | () http://seclists.org/fulldisclosure/2024/Jul/22 - Mailing List, Third Party Advisory | |
References | () http://seclists.org/fulldisclosure/2024/Jul/23 - Mailing List, Third Party Advisory | |
References | () https://support.apple.com/en-us/HT214117 - Release Notes, Vendor Advisory | |
References | () https://support.apple.com/en-us/HT214119 - Release Notes, Vendor Advisory | |
References | () https://support.apple.com/en-us/HT214122 - Release Notes, Vendor Advisory | |
References | () https://support.apple.com/en-us/HT214123 - Release Notes, Vendor Advisory | |
References | () https://support.apple.com/en-us/HT214124 - Release Notes, Vendor Advisory | |
First Time |
Apple macos
Apple iphone Os Apple visionos Apple watchos Apple Apple ipados Apple tvos |
|
CWE | NVD-CWE-noinfo |
30 Jul 2024, 13:32
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
30 Jul 2024, 02:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
30 Jul 2024, 01:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
29 Jul 2024, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-29 23:15
Updated : 2025-03-25 17:15
NVD link : CVE-2024-27863
Mitre link : CVE-2024-27863
CVE.ORG link : CVE-2024-27863
JSON object : View
Products Affected
apple
- visionos
- ipados
- tvos
- macos
- iphone_os
- watchos
CWE