![]() ![]() Impact: An app may cause unexpected app termination or arbitrary code executionĭescription: A memory corruption issue was addressed with improved validation.ĬVE-2023-29491: Jonathan Bar Or of Microsoft, Emanuele Cozzi of Microsoft, and Michael Pearse of Microsoftĭescription: This issue was addressed by removing the vulnerable code.ĬVE-2023-38601: Csaba Fitzl of Offensive Securityĭescription: A logic issue was addressed with improved validation.ĬVE-2023-32444: Mickey Jin added July 27, 2023 Impact: An app may be able to bypass Privacy preferencesĭescription: This issue was addressed with improved validation of symlinks.ĬVE-2023-38571: Gergely Kalman added July 27, 2023 Impact: An app may be able to cause a denial-of-serviceĭescription: A logic issue was addressed with improved checks. Impact: An app may be able to gain root privilegesĭescription: A path handling issue was addressed with improved validation.ĬVE-2023-38565: Zhipeng Huo of Tencent Security Xuanwu Lab () Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.7.1.ĭescription: This issue was addressed with improved state management.ĬVE-2023-38606: Valentin Pashkov, Mikhail Vinogradov, Georgy Kucherin Leonid Bezvershenko and Boris Larin of KasperskyĬVE-2023-32441: Peter Nguyễn Vũ Hoàng of STAR Labs SG Pte. ![]() Impact: An app may be able to modify sensitive kernel state. Impact: A remote user may be able to cause unexpected system termination or corrupt kernel memoryĭescription: A buffer overflow issue was addressed with improved memory handling.ĬVE-2023-38598: Mohamed GHANNAM added July 27, 2023ĭescription: An out-of-bounds read was addressed with improved bounds checking.ĬVE-2023-37285: Arsenii Kostromin (0x3c3e)ĭescription: An out-of-bounds write issue was addressed with improved input validation. Impact: A remote user may be able to cause a denial-of-service Impact: Processing a file may lead to unexpected app termination or arbitrary code executionĭescription: The issue was addressed with improved checks.ĬVE-2023-36854: Bool of YunShangHuaAn(云上华安)ĬVE-2023-32418: Bool of YunShangHuaAn(云上华安)ĭescription: A use-after-free issue was addressed with improved memory management.ĬVE-2023-35993: Kaitao Xie and Xiaolong Bai of Alibaba Group Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.7.1.ĭescription: The issue was addressed with improved handling of caches.ĬVE-2023-41990: Apple, Valentin Pashkov, Mikhail Vinogradov, Georgy Kucherin Leonid Bezvershenko and Boris Larin of Kaspersky ![]() Impact: Processing a font file may lead to arbitrary code execution. Impact: A user in a privileged network position may be able to leak sensitive informationĭescription: A logic issue was addressed with improved state management.ĭescription: Multiple issues were addressed by updating curl. Impact: An app may be able to modify protected parts of the file systemĭescription: This issue was addressed with improved data protection.ĬVE-2023-35983: Mickey Jin for: macOS Big SurĬVE-2023-40392: Wojciech Regula of SecuRing (wojciechregula.blog) Impact: A sandboxed process may be able to circumvent sandbox restrictionsĭescription: A logic issue was addressed with improved restrictions.ĬVE-2023-32364: Gergely Kalman added July 27, 2023 Impact: An app may be able to execute arbitrary code with kernel privilegesĭescription: The issue was addressed with improved memory handling.ĬVE-2023-34425: pattern-f of Ant Security Light-Year Lab Impact: An app may be able to read sensitive location informationĭescription: A privacy issue was addressed with improved private data redaction for log entries. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |