[<prev] [next>] [day] [month] [year] [list]
Message-id: <E3E1F77B-E277-4749-8B02-9BCC0C4B8768@lists.apple.com>
Date: Mon, 24 Jul 2023 17:26:51 -0700
From: Apple Product Security via Fulldisclosure <fulldisclosure@...lists.org>
To: security-announce@...ts.apple.com
Subject: [FD] APPLE-SA-2023-07-24-6 macOS Big Sur 11.7.9
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
APPLE-SA-2023-07-24-6 macOS Big Sur 11.7.9
macOS Big Sur 11.7.9 addresses the following issues.
Information about the security content is also available at
https://support.apple.com/kb/HT213845.
Apple maintains a Security Updates page at
https://support.apple.com/HT201222 which lists recent
software updates with security advisories.
Assets
Available for: macOS Big Sur
Impact: An app may be able to modify protected parts of the file system
Description: This issue was addressed with improved data protection.
CVE-2023-35983: Mickey Jin (@patch1t)
curl
Available for: macOS Big Sur
Impact: Multiple issues in curl
Description: Multiple issues were addressed by updating curl.
CVE-2023-28319
CVE-2023-28320
CVE-2023-28321
CVE-2023-28322
Grapher
Available for: macOS Big Sur
Impact: Processing a file may lead to unexpected app termination or
arbitrary code execution
Description: The issue was addressed with improved checks.
CVE-2023-36854: Bool of YunShangHuaAn(云上华安)
CVE-2023-32418: Bool of YunShangHuaAn(云上华安)
Kernel
Available for: macOS Big Sur
Impact: An app may be able to execute arbitrary code with kernel
privileges
Description: A use-after-free issue was addressed with improved memory
management.
CVE-2023-32381: an anonymous researcher
CVE-2023-32433: Zweig of Kunlun Lab
CVE-2023-35993: Kaitao Xie and Xiaolong Bai of Alibaba Group
Kernel
Available for: macOS Big Sur
Impact: An app may be able to modify sensitive kernel state. Apple is
aware of a report that this issue may have been actively exploited
against versions of iOS released before iOS 15.7.1.
Description: This issue was addressed with improved state management.
CVE-2023-38606: Valentin Pashkov, Mikhail Vinogradov, Georgy Kucherin
(@kucher1n), Leonid Bezvershenko (@bzvr_), and Boris Larin (@oct0xor) of
Kaspersky
Kernel
Available for: macOS Big Sur
Impact: An app may be able to execute arbitrary code with kernel
privileges
Description: The issue was addressed with improved memory handling.
CVE-2023-32441: Peter Nguyễn Vũ Hoàng (@peternguyen14) of STAR Labs SG
Pte. Ltd.
libxpc
Available for: macOS Big Sur
Impact: An app may be able to gain root privileges
Description: A path handling issue was addressed with improved
validation.
CVE-2023-38565: Zhipeng Huo (@R3dF09) of Tencent Security Xuanwu Lab
(xlab.tencent.com)
libxpc
Available for: macOS Big Sur
Impact: An app may be able to cause a denial-of-service
Description: A logic issue was addressed with improved checks.
CVE-2023-38593: Noah Roskin-Frazee
OpenLDAP
Available for: macOS Big Sur
Impact: A remote user may be able to cause a denial-of-service
Description: The issue was addressed with improved memory handling.
CVE-2023-2953: Sandipan Roy
PackageKit
Available for: macOS Big Sur
Impact: An app may be able to access user-sensitive data
Description: A logic issue was addressed with improved restrictions.
CVE-2023-38259: Mickey Jin (@patch1t)
PackageKit
Available for: macOS Big Sur
Impact: An app may be able to modify protected parts of the file system
Description: A permissions issue was addressed with additional
restrictions.
CVE-2023-38602: Arsenii Kostromin (0x3c3e)
sips
Available for: macOS Big Sur
Impact: Processing a file may lead to a denial-of-service or potentially
disclose memory contents
Description: An out-of-bounds read was addressed with improved input
validation.
CVE-2023-32443: David Hoyt of Hoyt LLC
Additional recognition
Mail
We would like to acknowledge Parvez Anwar for their assistance.
macOS Big Sur 11.7.9 may be obtained from the Mac App Store or
Apple's Software Downloads web site:
https://support.apple.com/downloads/
All information is also posted on the Apple Security Updates
web site: https://support.apple.com/en-us/HT201222.
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----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=gluJ
-----END PGP SIGNATURE-----
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: https://seclists.org/fulldisclosure/
Powered by blists - more mailing lists