The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.6.7, macOS Monterey 12.7.5, iOS 16.7.8 and iPadOS 16.7.8, tvOS 17.5, visionOS 1.2, iOS 17.5 and iPadOS 17.5, watchOS 10.5. An attacker that has already achieved kernel code execution may be able to bypass kernel memory protections.
The product reads or writes to a buffer using an index or pointer that references a memory location prior to the beginning of the buffer.
Link | Tags |
---|---|
https://support.apple.com/en-us/HT214101 | vendor advisory |
https://support.apple.com/en-us/HT214100 | vendor advisory |
https://support.apple.com/en-us/HT214107 | vendor advisory |
https://support.apple.com/en-us/HT214105 | vendor advisory |
https://support.apple.com/en-us/HT214108 | vendor advisory |
https://support.apple.com/en-us/HT214104 | vendor advisory |
https://support.apple.com/en-us/HT214102 | vendor advisory |
https://support.apple.com/kb/HT214107 | vendor advisory |
https://support.apple.com/kb/HT214102 | vendor advisory |
https://support.apple.com/kb/HT214104 | vendor advisory |
https://support.apple.com/kb/HT214105 | vendor advisory |
https://support.apple.com/kb/HT214100 | vendor advisory |
https://support.apple.com/kb/HT214101 | vendor advisory |
https://support.apple.com/kb/HT214108 | vendor advisory |
http://seclists.org/fulldisclosure/2024/Jun/5 | third party advisory mailing list |