CoreStorage in Apple OS X before 10.10 retains a volume's encryption keys upon an eject action in the unlocked state, which makes it easier for physically proximate attackers to obtain cleartext data via a remount.Referenceshttps://exchange.xforce.ibmcloud.com/vulnerabilities/97639http://www.securityfocus.com/bid/70628http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.htmlhttp://www.securitytracker.com/id/1031063https://support.apple.com/kb/HT6535