The issue was addressed with improved checks. This issue is fixed in iOS 17.5 and iPadOS 17.5, tvOS 17.5, Safari 17.5, watchOS 10.5, macOS Sonoma 14.5. An attacker with arbitrary read and write capability may be able to bypass Pointer Authentication.
A product defines a set of insecure permissions that are inherited by objects that are created by the program.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Red Hat Enterprise Linux 8 | RedHat | webkit2gtk3-0:2.38.5-1.el8_8.5 | * |
Red Hat Enterprise Linux 9 | RedHat | webkit2gtk3-0:2.38.5-1.el9_2.3 | * |
Qtwebkit-opensource-src | Ubuntu | devel | * |
Qtwebkit-opensource-src | Ubuntu | esm-apps/bionic | * |
Qtwebkit-opensource-src | Ubuntu | esm-apps/focal | * |
Qtwebkit-opensource-src | Ubuntu | esm-apps/jammy | * |
Qtwebkit-opensource-src | Ubuntu | esm-apps/noble | * |
Qtwebkit-opensource-src | Ubuntu | esm-infra/xenial | * |
Qtwebkit-opensource-src | Ubuntu | focal | * |
Qtwebkit-opensource-src | Ubuntu | jammy | * |
Qtwebkit-opensource-src | Ubuntu | mantic | * |
Qtwebkit-opensource-src | Ubuntu | noble | * |
Qtwebkit-opensource-src | Ubuntu | upstream | * |
Qtwebkit-source | Ubuntu | esm-apps/bionic | * |
Qtwebkit-source | Ubuntu | esm-apps/xenial | * |
Webkit2gtk | Ubuntu | esm-infra/bionic | * |
Webkit2gtk | Ubuntu | esm-infra/xenial | * |
Webkit2gtk | Ubuntu | focal | * |
Webkit2gtk | Ubuntu | jammy | * |
Webkit2gtk | Ubuntu | mantic | * |
Webkit2gtk | Ubuntu | noble | * |
Webkit2gtk | Ubuntu | upstream | * |
Webkitgtk | Ubuntu | esm-apps/bionic | * |
Webkitgtk | Ubuntu | esm-apps/xenial | * |
Wpewebkit | Ubuntu | esm-apps/focal | * |
Wpewebkit | Ubuntu | esm-apps/jammy | * |
Wpewebkit | Ubuntu | focal | * |
Wpewebkit | Ubuntu | jammy | * |