[prev in list] [next in list] [prev in thread] [next in thread] 

List:       full-disclosure
Subject:    [FD] APPLE-SA-2023-07-24-5 macOS Monterey 12.6.8
From:       Apple Product Security via Fulldisclosure <fulldisclosure () seclists ! org>
Date:       2023-07-25 0:26:32
Message-ID: EF6A0C6B-BD5D-44C0-8A1C-30FAC263B2B6 () lists ! apple ! com
[Download RAW message or body]

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

APPLE-SA-2023-07-24-5 macOS Monterey 12.6.8

macOS Monterey 12.6.8 addresses the following issues.
Information about the security content is also available at
https://support.apple.com/kb/HT213844.

Apple maintains a Security Updates page at
https://support.apple.com/HT201222 which lists recent
software updates with security advisories.

Assets
Available for: macOS Monterey
Impact: An app may be able to modify protected parts of the file system
Description: This issue was addressed with improved data protection.
CVE-2023-35983: Mickey Jin (@patch1t)

curl
Available for: macOS Monterey
Impact: Multiple issues in curl
Description: Multiple issues were addressed by updating curl.
CVE-2023-28319
CVE-2023-28320
CVE-2023-28321
CVE-2023-28322

Find My
Available for: macOS Monterey
Impact: An app may be able to read sensitive location information
Description: A logic issue was addressed with improved restrictions.
CVE-2023-32416: Wojciech Regula of SecuRing (wojciechregula.blog)

Grapher
Available for: macOS Monterey
Impact: Processing a file may lead to unexpected app termination or
arbitrary code execution
Description: The issue was addressed with improved checks.
CVE-2023-36854: Bool of YunShangHuaAn(云上华安)
CVE-2023-32418: Bool of YunShangHuaAn(云上华安)

Kernel
Available for: macOS Monterey
Impact: An app may be able to execute arbitrary code with kernel
privileges
Description: A use-after-free issue was addressed with improved memory
management.
CVE-2023-32381: an anonymous researcher
CVE-2023-32433: Zweig of Kunlun Lab
CVE-2023-35993: Kaitao Xie and Xiaolong Bai of Alibaba Group

Kernel
Available for: macOS Monterey
Impact: An app may be able to modify sensitive kernel state. Apple is
aware of a report that this issue may have been actively exploited
against versions of iOS released before iOS 15.7.1.
Description: This issue was addressed with improved state management.
CVE-2023-38606: Valentin Pashkov, Mikhail Vinogradov, Georgy Kucherin
(@kucher1n), Leonid Bezvershenko (@bzvr_), and Boris Larin (@oct0xor) of
Kaspersky

Kernel
Available for: macOS Monterey
Impact: An app may be able to execute arbitrary code with kernel
privileges
Description: The issue was addressed with improved memory handling.
CVE-2023-32441: Peter Nguyễn Vũ Ho ng (@peternguyen14) of STAR Labs SG
Pte. Ltd.

libxpc
Available for: macOS Monterey
Impact: An app may be able to gain root privileges
Description: A path handling issue was addressed with improved
validation.
CVE-2023-38565: Zhipeng Huo (@R3dF09) of Tencent Security Xuanwu Lab
(xlab.tencent.com)

libxpc
Available for: macOS Monterey
Impact: An app may be able to cause a denial-of-service
Description: A logic issue was addressed with improved checks.
CVE-2023-38593: Noah Roskin-Frazee

Model I/O
Available for: macOS Monterey
Impact: Processing a 3D model may result in disclosure of process memory
Description: The issue was addressed with improved checks.
CVE-2023-38421: Mickey Jin (@patch1t)
CVE-2023-38258: Mickey Jin (@patch1t)

OpenLDAP
Available for: macOS Monterey
Impact: A remote user may be able to cause a denial-of-service
Description: The issue was addressed with improved memory handling.
CVE-2023-2953: Sandipan Roy

PackageKit
Available for: macOS Monterey
Impact: An app may be able to access user-sensitive data
Description: A logic issue was addressed with improved restrictions.
CVE-2023-38259: Mickey Jin (@patch1t)

PackageKit
Available for: macOS Monterey
Impact: An app may be able to modify protected parts of the file system
Description: A permissions issue was addressed with additional
restrictions.
CVE-2023-38602: Arsenii Kostromin (0x3c3e)

Shortcuts
Available for: macOS Monterey
Impact: A shortcut may be able to modify sensitive Shortcuts app
settings
Description: An access issue was addressed with improved access
restrictions.
CVE-2023-32442: an anonymous researcher

sips
Available for: macOS Monterey
Impact: Processing a file may lead to a denial-of-service or potentially
disclose memory contents
Description: An out-of-bounds read was addressed with improved input
validation.
CVE-2023-32443: David Hoyt of Hoyt LLC

Additional recognition

Mail
We would like to acknowledge Parvez Anwar for their assistance.

macOS Monterey 12.6.8 may be obtained from the Mac App Store or
Apple's Software Downloads web site:
https://support.apple.com/downloads/
All information is also posted on the Apple Security Updates
web site: https://support.apple.com/en-us/HT201222.

This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----
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=/L9p
-----END PGP SIGNATURE-----

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: https://seclists.org/fulldisclosure/
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic