-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 APPLE-SA-05-13-2024-2 iOS 17.5 and iPadOS 17.5 iOS 17.5 and iPadOS 17.5 addresses the following issues. Information about the security content is also available at https://support.apple.com/HT214101. Apple maintains a Security Releases page at https://support.apple.com/HT201222 which lists recent software updates with security advisories. AppleAVD Available for: iPhone XS and later, iPad Pro 12.9-inch 2nd generation and later, iPad Pro 10.5-inch, iPad Pro 11-inch 1st generation and later, iPad Air 3rd generation and later, iPad 6th generation and later, and iPad mini 5th generation and later Impact: An app may be able to execute arbitrary code with kernel privileges Description: The issue was addressed with improved memory handling. CVE-2024-27804: Meysam Firouzi (@R00tkitSMM) AppleMobileFileIntegrity Available for: iPhone XS and later, iPad Pro 12.9-inch 2nd generation and later, iPad Pro 10.5-inch, iPad Pro 11-inch 1st generation and later, iPad Air 3rd generation and later, iPad 6th generation and later, and iPad mini 5th generation and later Impact: An attacker may be able to access user data Description: A logic issue was addressed with improved checks. CVE-2024-27816: Mickey Jin (@patch1t) AVEVideoEncoder Available for: iPhone XS and later, iPad Pro 12.9-inch 2nd generation and later, iPad Pro 10.5-inch, iPad Pro 11-inch 1st generation and later, iPad Air 3rd generation and later, iPad 6th generation and later, and iPad mini 5th generation and later Impact: An app may be able to disclose kernel memory Description: The issue was addressed with improved memory handling. CVE-2024-27841: an anonymous researcher Find My Available for: iPhone XS and later, iPad Pro 12.9-inch 2nd generation and later, iPad Pro 10.5-inch, iPad Pro 11-inch 1st generation and later, iPad Air 3rd generation and later, iPad 6th generation and later, and iPad mini 5th generation and later Impact: A malicious application may be able to determine a user's current location Description: A privacy issue was addressed by moving sensitive data to a more secure location. CVE-2024-27839: Alexander Heinrich, SEEMOO, TU Darmstadt (@Sn0wfreeze), and Shai Mishali (@freak4pc) Kernel Available for: iPhone XS and later, iPad Pro 12.9-inch 2nd generation and later, iPad Pro 10.5-inch, iPad Pro 11-inch 1st generation and later, iPad Air 3rd generation and later, iPad 6th generation and later, and iPad mini 5th generation and later Impact: An attacker may be able to cause unexpected app termination or arbitrary code execution Description: The issue was addressed with improved memory handling. CVE-2024-27818: pattern-f (@pattern_F_) of Ant Security Light-Year Lab Libsystem Available for: iPhone XS and later, iPad Pro 12.9-inch 2nd generation and later, iPad Pro 10.5-inch, iPad Pro 11-inch 1st generation and later, iPad Air 3rd generation and later, iPad 6th generation and later, and iPad mini 5th generation and later Impact: An app may be able to access protected user data Description: A permissions issue was addressed by removing vulnerable code and adding additional checks. CVE-2023-42893: an anonymous researcher Maps Available for: iPhone XS and later, iPad Pro 12.9-inch 2nd generation and later, iPad Pro 10.5-inch, iPad Pro 11-inch 1st generation and later, iPad Air 3rd generation and later, iPad 6th generation and later, and iPad mini 5th generation and later Impact: An app may be able to read sensitive location information Description: A path handling issue was addressed with improved validation. CVE-2024-27810: LFY@secsys of Fudan University MarketplaceKit Available for: iPhone XS and later Impact: A maliciously crafted webpage may be able to distribute a script that tracks users on other webpages Description: A privacy issue was addressed with improved client ID handling for alternative app marketplaces. CVE-2024-27852: Talal Haj Bakry and Tommy Mysk of Mysk Inc. (@mysk_co) Notes Available for: iPhone XS and later, iPad Pro 12.9-inch 2nd generation and later, iPad Pro 10.5-inch, iPad Pro 11-inch 1st generation and later, iPad Air 3rd generation and later, iPad 6th generation and later, and iPad mini 5th generation and later Impact: An attacker with physical access to an iOS device may be able to access notes from the lock screen Description: This issue was addressed through improved state management. CVE-2024-27835: Andr.Ess RemoteViewServices Available for: iPhone XS and later, iPad Pro 12.9-inch 2nd generation and later, iPad Pro 10.5-inch, iPad Pro 11-inch 1st generation and later, iPad Air 3rd generation and later, iPad 6th generation and later, and iPad mini 5th generation and later Impact: An attacker may be able to access user data Description: A logic issue was addressed with improved checks. CVE-2024-27816: Mickey Jin (@patch1t) Screenshots Available for: iPhone XS and later, iPad Pro 12.9-inch 2nd generation and later, iPad Pro 10.5-inch, iPad Pro 11-inch 1st generation and later, iPad Air 3rd generation and later, iPad 6th generation and later, and iPad mini 5th generation and later Impact: An attacker with physical access may be able to share items from the lock screen Description: A permissions issue was addressed with improved validation. CVE-2024-27803: an anonymous researcher Shortcuts Available for: iPhone XS and later, iPad Pro 12.9-inch 2nd generation and later, iPad Pro 10.5-inch, iPad Pro 11-inch 1st generation and later, iPad Air 3rd generation and later, iPad 6th generation and later, and iPad mini 5th generation and later Impact: A shortcut may output sensitive user data without consent Description: A path handling issue was addressed with improved validation. CVE-2024-27821: Kirin (@Pwnrin), zbleet, and Csaba Fitzl (@theevilbit) of Kandji Sync Services Available for: iPhone XS and later, iPad Pro 12.9-inch 2nd generation and later, iPad Pro 10.5-inch, iPad Pro 11-inch 1st generation and later, iPad Air 3rd generation and later, iPad 6th generation and later, and iPad mini 5th generation and later Impact: An app may be able to bypass Privacy preferences Description: This issue was addressed with improved checks CVE-2024-27847: Mickey Jin (@patch1t) Voice Control Available for: iPhone XS and later, iPad Pro 12.9-inch 2nd generation and later, iPad Pro 10.5-inch, iPad Pro 11-inch 1st generation and later, iPad Air 3rd generation and later, iPad 6th generation and later, and iPad mini 5th generation and later Impact: An attacker may be able to elevate privileges Description: The issue was addressed with improved checks. CVE-2024-27796: ajajfxhj WebKit Available for: iPhone XS and later, iPad Pro 12.9-inch 2nd generation and later, iPad Pro 10.5-inch, iPad Pro 11-inch 1st generation and later, iPad Air 3rd generation and later, iPad 6th generation and later, and iPad mini 5th generation and later Impact: An attacker with arbitrary read and write capability may be able to bypass Pointer Authentication Description: The issue was addressed with improved checks. WebKit Bugzilla: 272750 CVE-2024-27834: Manfred Paul (@_manfp) working with Trend Micro's Zero Day Initiative Additional recognition App Store We would like to acknowledge an anonymous researcher for their assistance. CoreHAP We would like to acknowledge Adrian Cable for their assistance. Face ID We would like to acknowledge Lucas Monteiro, Daniel Monteiro, and Felipe Monteiro for their assistance. HearingCore We would like to acknowledge an anonymous researcher for their assistance. Managed Configuration We would like to acknowledge 遥遥领先 (@晴天组织) for their assistance. Safari Downloads We would like to acknowledge Arsenii Kostromin (0x3c3e) for their assistance. Status Bar We would like to acknowledge Abhay Kailasia (@abhay_kailasia) of Lakshmi Narain College of Technology Bhopal for their assistance. This update is available through iTunes and Software Update on your iOS device, and will not appear in your computer's Software Update application, or in the Apple Downloads site. Make sure you have an Internet connection and have installed the latest version of iTunes from https://www.apple.com/itunes/ iTunes and Software Update on the device will automatically check Apple's update server on its weekly schedule. When an update is detected, it is downloaded and the option to be installed is presented to the user when the iOS device is docked. We recommend applying the update immediately if possible. Selecting Don't Install will present the option the next time you connect your iOS device. The automatic update process may take up to a week depending on the day that iTunes or the device checks for updates. You may manually obtain the update via the Check for Updates button within iTunes, or the Software Update on your device. To check that the iPhone, iPod touch, or iPad has been updated: * Navigate to Settings * Select General * Select About. The version after applying this update will be "iOS 17.5 and iPadOS 17.5". All information is also posted on the Apple Security Releases web site: https://support.apple.com/HT201222. This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEsz9altA7uTI+rE/qX+5d1TXaIvoFAmZCru4ACgkQX+5d1TXa IvrSLxAAnqj3N4PyUOrHm+zOFx2kEM5qVOwxJVlqbH9Q6DMG2L54N2iTmyR4X0W8 5uOA9hmHW9TdR+OT85zMXSXdNWn16BMzUtYQjXTk4pU4dEpcD/V5Vjs8dq+LX6YH 1Y9/M8K/wh7oAmPfnRQbCitEvwMRpXglHQbfeydUKhri67LeNRYKpYu7KRZrFP+X SfFfqJOI4a1FM/xDgFALCsDVws/qdk1K9o0NoxEjKcwvTplCoNtHajjW1l3QT4nM xgcueMqfJL99nbCzisEmwovbhD17UQDA4zrxrRejCjY233g7uDB6vIkQDCUzSqo8 2lb+HO0uCMG3rkMQs1jt6iCNYpop4n+tvpLz9DLB+H5PqXXZYQe9dHsEgnuhsMCR lpJ7MGgAxEaIs/bZQLVJKa3UEZXbd4s5OUz3kE8tRx5faFj4zIj+8++W+2vI8q8q ZNm2hA/APket6twiTDOxjO4uFdo/TGQUtVI+RSAToKAA3k31wNhKXUTTssUb8at9 Sto+BA3p/fJ0fZhGWunJ3kABacSuZcp9lQsCB2mIs6f1fBidCCZD+257uaQfNe9b hPaiRJj8JIkbNII07U7Yat+86RVNqZemascU5zZJxsV2vLsOTreptkJ4Wot8ghnh rozRvGjqYPgmsXV350+6tL651rbbQAJbf8APIohEjUIXFQkg6DI= =3eb1 -----END PGP SIGNATURE-----