The issue was addressed with improved checks. This issue is fixed in iOS 17.5 and iPadOS 17.5, tvOS 17.5, Safari 17.5, watchOS 10.5, macOS Sonoma 14.5. An attacker with arbitrary read and write capability may be able to bypass Pointer Authentication.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Safari | Apple | * | 17.5 (excluding) |
Ipados | Apple | * | 17.5 (excluding) |
Iphone_os | Apple | * | 17.5 (excluding) |
Macos | Apple | 14.0 (including) | 14.5 (excluding) |
Tvos | Apple | * | 17.5 (excluding) |
Watchos | Apple | * | 10.5 (excluding) |
Red Hat Enterprise Linux 8 | RedHat | webkit2gtk3-0:2.38.5-1.el8_8.5 | * |
Red Hat Enterprise Linux 9 | RedHat | webkit2gtk3-0:2.38.5-1.el9_2.3 | * |
Qtwebkit-opensource-src | Ubuntu | devel | * |
Qtwebkit-opensource-src | Ubuntu | esm-apps/bionic | * |
Qtwebkit-opensource-src | Ubuntu | esm-apps/focal | * |
Qtwebkit-opensource-src | Ubuntu | esm-apps/jammy | * |
Qtwebkit-opensource-src | Ubuntu | esm-apps/noble | * |
Qtwebkit-opensource-src | Ubuntu | esm-infra/xenial | * |
Qtwebkit-opensource-src | Ubuntu | focal | * |
Qtwebkit-opensource-src | Ubuntu | jammy | * |
Qtwebkit-opensource-src | Ubuntu | mantic | * |
Qtwebkit-opensource-src | Ubuntu | noble | * |
Qtwebkit-opensource-src | Ubuntu | upstream | * |
Qtwebkit-source | Ubuntu | esm-apps/bionic | * |
Qtwebkit-source | Ubuntu | esm-apps/xenial | * |
Webkit2gtk | Ubuntu | esm-infra/bionic | * |
Webkit2gtk | Ubuntu | esm-infra/xenial | * |
Webkit2gtk | Ubuntu | focal | * |
Webkit2gtk | Ubuntu | jammy | * |
Webkit2gtk | Ubuntu | mantic | * |
Webkit2gtk | Ubuntu | noble | * |
Webkit2gtk | Ubuntu | upstream | * |
Webkitgtk | Ubuntu | esm-apps/bionic | * |
Webkitgtk | Ubuntu | esm-apps/xenial | * |
Wpewebkit | Ubuntu | esm-apps/focal | * |
Wpewebkit | Ubuntu | esm-apps/jammy | * |
Wpewebkit | Ubuntu | focal | * |
Wpewebkit | Ubuntu | jammy | * |