First published: Mon Jan 23 2023(Updated: )
Kernel. The issue was addressed with improved memory handling.
Credit: Pan ZhenPeng @Peterpan0927 STAR Labs SG PtePan ZhenPeng @Peterpan0927 STAR Labs SG PtePan ZhenPeng @Peterpan0927 STAR Labs SG PtePan ZhenPeng @Peterpan0927 STAR Labs SG PtePan ZhenPeng @Peterpan0927 STAR Labs SG Pte product-security@apple.com product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iPadOS | <15.7.3 | |
Apple iPadOS | >=16.0<16.3 | |
Apple iPhone OS | <15.7.3 | |
Apple iPhone OS | >=16.0<16.3 | |
Apple macOS | >=13.0<13.2 | |
Apple tvOS | <16.3 | |
Apple watchOS | <9.3 | |
<13.2 | 13.2 | |
<16.3 | 16.3 | |
<16.3 | 16.3 | |
<16.3 | 16.3 | |
<15.7.3 | 15.7.3 | |
<15.7.3 | 15.7.3 | |
Apple watchOS | <9.3 | 9.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID for this issue is CVE-2023-23500.
The severity of CVE-2023-23500 is medium (5.5).
The affected software for CVE-2023-23500 includes macOS Ventura 13.2, iOS 16.3 and iPadOS 16.3, iOS 15.7.3 and iPadOS 15.7.3, tvOS 16.3, and watchOS 9.3.
To fix CVE-2023-23500, update your software to the latest versions: macOS Ventura 13.2, iOS 16.3 and iPadOS 16.3, iOS 15.7.3 and iPadOS 15.7.3, tvOS 16.3, and watchOS 9.3.
You can find more information about CVE-2023-23500 on the Apple support page: [https://support.apple.com/en-us/HT213598](https://support.apple.com/en-us/HT213598)